Most people seem to call every type of malware a “virus”, but that isn’t technically accurate. You’ve probably heard of many more terms beyond virus: malware, worm, Trojan, rootkit, keylogger, spyware, and more. But what do all these terms mean? These terms aren’t just used by geeks. They make their way into even mainstream news stories about the latest web security problems and tech scares. Understanding them will help you understand the dangers you’ve heard about. Malware The word “malware” is short for “malicious software.” Many people use the word “virus” to indicate any type of harmful software, but a virus is actually just a specific type of malware. The word “malware” encompasses all harmful software, including all the ones listed below. Virus Let’s start with viruses. A virus is a type of malware that copies itself by infecting other files, just as viruses in the real world infect biological cells and use those biological cells to reproduce copies of themselves. A virus can do many different things — watch in the background and steal your passwords, display advertisements, or just crash your computer — but the key thing that makes it a virus is how it spreads. When you run a virus, it will infect programs on your computer. When you run the program on another computer, the virus will infect programs on that computer, and so on. For example, a virus might infect program files on a USB stick. When the programs on that USB stick are run on another computer, the virus runs on the other computer and infects more program files. The virus will continue to spread in this way. Worm A worm is similar to a virus, but it spreads a different way. Rather than infecting files and relying on human activity to move those files around and run them on different systems, a worm spreads over computer networks on its own accord. For example, the Blaster and Sasser worms spread very quickly in the days of Windows XP because Windows XP did not come properly secured and exposed system services to the Internet. The worm accessed these system services over the Internet, exploited a vulnerability, and infected the computer. The worm then used the new infected computer to continue replicating itself. Such worms are less common now that Windows is properly firewalled by default, but worms can also spread in other ways — for example, by mass-emailing themselves to every email address in an affected user’s address book. Like a virus, a worm can do any number of other harmful things once it infects a computer. The key thing that makes it a worm is simply how it copies and spreads itself. Trojan (or Trojan Horse) A Trojan horse, or Trojan, is a type of malware that disguises itself as a legitimate file. When you download and run the program, the Trojan horse will run...

More and more these days, we are becoming more aware of the need for security on our computers, and for our entire internet experience. But how do you keep things safe in a world full of hackers and cyber attacks? No method is 100% secure or foolproof, but you can certainly take steps to make your experience much safer. Why do I need to secure my connection? You should secure your connection regardless of what you actually use your internet for. The reason for this is that most of us manage some sort of accounts online, including bank accounts. For many banks, the security of your online account can hinge on the security of your email account, and if your email account is compromised, then everything you do online could be compromised. So how do hackers get access to your stuff? There are a lot of different ways this can be done, and I won’t go into detail about all of them, but I will explain the basics. One method is very simple, and it basically involves a hacker “sniffing” the traffic on a wireless network. Even if you’re only using your home network, wireless network security is very insecure, and is easily broken, so you cannot rely on your routers security settings to keep you safe. Always assume that other people could be on your network, and see what you’re doing. Once a wireless network has been accessed, an attacker can use a program like WireShark to capture all the traffic. Applications like WireShark, called packet sniffers, are able to capture and save all the traffic on your network, which means an attacker can read your user name and password. This is often protected by SSL (secure socket layer) encryption, but if it is intercepted before encryption takes place, this doesn’t do you any good. Other methods may include malware on your system, which can log everything you type, as you type it, which compromises everything. Most antivirus programs will catch most of these rogue programs, but there is never any guarantee. Running Windows as an operating system is risky for web browsing, especially if you use Internet Explorer. If you are using Internet Explorer, please stop it now, and go download Google Chrome, or Mozilla Firefox. Internet Explorer is a bad idea because the browser itself is tied into the operating system, and if the browser is compromised (very common for Internet Explorer) then your entire system is compromised. The first step is using a better browser. Now, let’s explore some options to keep you more secure. Securing your connection Using a VPN What is a VPN? VPN stands for Virtual Private Network. When you are connected to a VPN, all network traffic is encrypted, and routed through a VPN server. The VPN server then communicates with the internet on behalf of...

Information about computer and network security As more people use email and more services such as banking, mail orders and subscriptions become available through the Internet computer security becomes a necessary part of using a computer. But how secure is the Internet and what is computer security? Updating Software It is very important to update your software periodically. When a program is released, particular internet browsers, it may contain flaws usually referred to as bugs. These bugs may not appear to be a problem but criminals will attempt to use these flaws for their own use. Keeping your software up to date will help keep your computer secure. Computers & Security Before the Internet, computer security was limited to ‘closed systems‘ or network computers such as offices or banks where only people physically in the office could use the computer system. It was quite easy for the network supervisor to set up user names and passwords and monitor all the activity on the network. People have become used to logging on before they can use these types of computers or resources. With the advent of the Internet, computers users can now work in an ‘open system‘ and security has become more complicated. Even though you can now connect your home or office computer to the Internet and perform remote transactions you still want to be sure that the transaction is secure. The transaction takes place through the internet by routing the information through various computers before it reaches the computer you are connecting to. You want to be sure that no one observes the transaction along the way and collects or modifies your transaction information. This is where computer security comes in. There are many different types of security systems though most use a process called encryption. When you connect to your bank or other service to make a transaction you are often required to send your account number or user name as well as a Personal Identification Number (PIN) or password for verification. This information should only be sent after establishing a secure connection. If you are using an Internet browser you will see a small closed lock appear in the window of the browser. Once you are connected to a secure server any information you send or receive is scrambled or encrypted using a mathematical formula and then reassembled or decrypted at the other end. The computer user usually will not notice this happening as they perform their secure transaction. Anyone with criminal intent who intercepts your transaction will be treated to a stream of garbled nonsense – (e.g.. qANQR1DBwU4D560EJv6XqrMQB)! If this is the first time you use a new service you most often will need to setup an account and possibly download a small piece of software called a plug in which allows your computer to create the secure connection or link. The transaction often involves the exchange of a small file that keeps track of the transaction and can act a flag or bookmark when you next visit that website. These small files are...

About Computer Viruses A virus is a program designed by a computer programmer (malicious hacker) to do a certain unwanted function. The virus program can be simply annoying like displaying a happy face on the user’s screen at a certain time and date. It can also be very destructive and damage your computer’s programs and files causing the computer to stop working. The reason why hackers create viruses are open for speculation. The most quoted reason is simply to see if it can be done. Other reasons are Ludite based “smash the machine” motivations, antiestablishment/anti-corporate actions, criminal intent, and various others that range into the “conspiracy theory” realm. Viruses take two basic forms One is a boot sector viruses which infect the section of a disk that is first read by the computer. This type of virus infects the boot or master section of any disks that it comes in contact with. The second is a program virus that infects other programs when the infected program is run or executed. Some viruses infect both and others change themselves (polymorphic) depending on the programs they encounter. Though viruses do not damage computer hardware there have been attempts to create programs that will do things like run the hard drive until it fails or lodge itself in the computer’s clock (which has a rechargeable battery) allowing it to remain active even months after the computer has been unplugged. Other viruses affect certain microchips (BIOS chip for instance). These microchips need to be modified under normal computer use but the virus program can produce changes which cause them to fail. Other viruses will affect the characters or images displayed on the screen which may give the impression of monitor failure. Viruses can cause a great deal of damage to the computers it infects and can cost a lot of time and money to correct it. Computer viruses have been around for a long time, even before computers became widely used and they will likely remain with us forever. For that reason computer users will always need ways to protect themselves from virus programs. The main, common feature of a virus is that it is contagious! Their sole purpose is to spread and infect other computers. A computer gets a virus from an infected file. The virus might attach themselves to a game, a program (both shareware and commercial) or a file downloaded from a bulletin board or the Internet. You cannot get a virus from a plain email message or from a simple text file! That is because the virus needs to be ‘run‘ or executed before it can take effect. This usually happens when the user tries to open an infected program, accesses an infected disk or opens a file with an infected macro or script attached to it. A plain email message is made up of text which does not execute or run when opened. Modern email programs provide the ability to allow users to format email messages with HTML and attach scripts to...